Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 09:44
Static task
static1
Behavioral task
behavioral1
Sample
5e67e79705712dbb752ced2a38755195_JaffaCakes118.rar
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5e67e79705712dbb752ced2a38755195_JaffaCakes118.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
DemostrativoExtrato.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
DemostrativoExtrato.exe
Resource
win10v2004-20240426-en
General
-
Target
DemostrativoExtrato.exe
-
Size
2.6MB
-
MD5
2341d1b53f57972ec2b804edcc4889fa
-
SHA1
9aa4e9be7146e74ff8373ce06fb0ef74800ceb84
-
SHA256
bae7127917ef103b10a4cc40338bf49b91e8aeb01271fd15a80c80be1f95adbf
-
SHA512
ed2a6bc2545a1b6a6335467d4129fe0cec6ad08594ca6783ce5eacdccd755ba02104ce3196ebd4e989434fcef774646c32e426a208f585bdde7844e0e8ea681a
-
SSDEEP
49152:SbYdOEn8rPSTXoUAhKkyYVyq9n0q5VWy7EeNUkRsC2iaKtF+JR:SbI+z3hKkyYVZZPtQAf32wzoR
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
DemostrativoExtrato.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DemostrativoExtrato.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
DemostrativoExtrato.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DemostrativoExtrato.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate DemostrativoExtrato.exe -
Modifies registry class 5 IoCs
Processes:
DemostrativoExtrato.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B1152430-BBE9-0A92-C96C-CE3AB0BDC0EE}\InProcServer32 DemostrativoExtrato.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B1152430-BBE9-0A92-C96C-CE3AB0BDC0EE}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shell32.dll" DemostrativoExtrato.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B1152430-BBE9-0A92-C96C-CE3AB0BDC0EE}\InProcServer32\ThreadingModel = "Apartment" DemostrativoExtrato.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B1152430-BBE9-0A92-C96C-CE3AB0BDC0EE} DemostrativoExtrato.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B1152430-BBE9-0A92-C96C-CE3AB0BDC0EE}\ = "Microsoft DocProp Inplace Droplist Combo Control" DemostrativoExtrato.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
DemostrativoExtrato.exedescription pid Process Token: 33 3512 DemostrativoExtrato.exe Token: SeIncBasePriorityPrivilege 3512 DemostrativoExtrato.exe Token: 33 3512 DemostrativoExtrato.exe Token: SeIncBasePriorityPrivilege 3512 DemostrativoExtrato.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
DemostrativoExtrato.exedescription pid Process procid_target PID 4860 wrote to memory of 3512 4860 DemostrativoExtrato.exe 83 PID 4860 wrote to memory of 3512 4860 DemostrativoExtrato.exe 83 PID 4860 wrote to memory of 3512 4860 DemostrativoExtrato.exe 83 PID 4860 wrote to memory of 3512 4860 DemostrativoExtrato.exe 83 PID 4860 wrote to memory of 3512 4860 DemostrativoExtrato.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\DemostrativoExtrato.exe"C:\Users\Admin\AppData\Local\Temp\DemostrativoExtrato.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\DemostrativoExtrato.exe"C:\Users\Admin\AppData\Local\Temp\DemostrativoExtrato.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD516c8153f4a1221fadd0c171933b32c03
SHA1620f712d7957439813636f7b3efcbe9f02a98b19
SHA256b3d8cf4cd04048890c94c0dd063fe354f8abc35ef9e2a9a75aa89da23fde06ac
SHA5122ce4ae801b286810ba0840dd3418221cafb30985ace40f902348fa0356e11b7f96a4ee8c00f39a8370ae25239985629417b860a946d0c4bd157d5b856736d843